The Dirty Half-Dozen
- 10 August, 2001 09:00
5. Uncooperative Business Partners
What can go wrong: Texas-based, drug distributor FoxMeyer filed for bankruptcy in 1996. The company partially blamed a failed ERP project and sued its software vendor, SAP, as well as Andersen Consulting (now Accenture). The case is pending. While the FoxMeyer case is extreme, most of today's sizeable IT projects involve a vendor of some sort - be it a software company, a system integrator, a consultancy or all of the above. When they're wooing you, those companies say they're your partner. They're not. No matter how much they want your project to succeed or how honourable their intentions, they have pressures of their own.
Moreover, within your business, "there's resistance and resentment over outsiders coming in and the money being paid to those outsiders. That is an impediment to sharing information", Portny says.
What you can do about it: First, try to negotiate a contract that minimises consultant turnover. Corporate IT pros who've worked with system integrators are painfully familiar with the bait-and-switch practice wherein the system integrator's "A Team" flies in for presales meetings and launch - then promptly hands the project off to a less experienced, and perhaps less skilled, crew.
And when working on that contract, DeMarco says, it's important to eschew take-no-prisoners negotiating and move instead toward a reasonable, achievable agreement. "There's this attitude today that the negotiating's not over until the other guy's screwed," he says. "This is foolish. These aren't adversaries, these are your partners."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
The Big Data Security Analytics Era is Here
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.
Top 10 tips for Migration
As users bring multiple devices to the workplace, IT departments need to have a single view of all their mobile devices. Find out how to build a secure and reliable management platform for next generation mobile computing across multiple platforms. Click for more!
How Web Security Improves Productivity and Compliance
In this white paper, we will look at how secure web gateways, one type of information security technology, can provide benefits to many departments within any business or government agency. Download now.